Don’t Use Internet Explorer

Here’s the latest implied message from Microsoft to its valued clients: “Don’t use Internet Explorer”. Support is ending for Internet Explorer versions 8, 9 and 10. It has been suggested that users switch over to Microsoft’s newest Edge browser. There is, of course, the option of switching over to Internet Explorer 11 if you absolutely feel compelled to stick with the browser, though …

Antivirus Bug Steals Passwords

An uncomfortable news update on the cyber security circuit sheds light on the fact that an antivirus bug is now stealing user passwords. This is particularly disconcerting for both individuals and businesses who rely on antivirus software to keep hackers out. Anyone who has installed Trend Micro’s Antivirus on their Windows computer should be on high alert, as this is the source of …

Cyber Security and HIPPA Compliance

The threat of cyber attack on your business is very real. Healthcare companies and providers can be subject to civil and criminal penalties if they violate HIPAA standards by not being HIPAA compliant. Is your business HIPAA compliant? What about your IT vendor? Many small and mid-sized businesses simply do not know how to protect and defend against the threat …

Social Engineering

Have you ever been curious as to why people arrange their desks so that people can’t look behind them or have film protecting their monitors from being viewed by passersby?  It’s not just because they want to keep their coworkers or their bosses from seeing what they are doing or not doing.  We live in a world where information is …

Rumor: Windows 7 is a Security Risk

Microsoft has begun yet another round of would-be scare tactics in their latest effort to get their customer base to shift to their latest operating system, Windows 10. Chris Capossela, Microsoft’s Chief Marketing Officer has warned that continued use of the ‘outdated’ Windows 7 software should be carried out at the risk of the user. The rumor that Windows 7 …

Malware Caused a Power Outage

Cyber criminals have always had their eye on SCADA system. With the success of  Stuxnet malware, designed to thwart Iranian nuclear facilities, it is hardly surprising that hackers believe SCADA to be a worthy target. Towards the end of December, reports that malware caused a power outage in at least 3 regions of Ukraine made cyber headlines, proof positive that hackers are …

Chinese Hackers Rampant on Social Media

For many years the Tibet region of the Republic of China has been experiencing conflict. The threat continues online, where Chinese State-sponsored hackers target groups viewed as a threat to the nation; usually pro-democracy movements. The Tibetan community’s exclusive social networking site, unitib.com, is the most recent alleged ally of the Free Tibet movement to be targeted by Chinese hackers. …

TOR Announces Bug Bounty Program

In a somewhat revolutionary step, the non-profit organization responsible for TOR has announced what they call the ‘Bug Bounty Program.’ As the largest, most popular tool designed to grant anonymity online; it comes as no surprise that cyber security is a huge part of the functioning of the TOR network. The Bug Bounty Program, in a nutshell, is an incentive …